In this course, Students continue working with IoT devices. Students connect devices and analyze firmware and software for weaknesses. Students research and perform upgrades to IoT devices. After upgrading the IoT devices, the students secure these devices by applying industry best practices. This may include changing firewall settings or remote access settings. Upon completion of this course, students can recognize, update and secure IoT devices.
Investigate the purpose and characteristics of firmware.
Examine the basic principles of threat modeling.
Explore threat modeling software.
Examine firmware properties.
Examine IoT mobile applications to exploit common vulnerabilities.
Explain IoT device hacking.
Explore Software Defined Radio (SDR).
Analyze firmware security best practices.
Compare the methods used to secure hardware.